Browse Items (11809 total)
Sort by:
-
Detecting Deepfake Voices Using a Novel Method for Authenticity Verification in Voice-Based Communication
The widespread use of deepfake technology in recent years has given rise to grave worries about the alteration of audio-visual material. The integrity of voice-based communication is particularly vulnerable to the threat posed by deepfake voice synthesis. The development of cutting-edge methods for the identification of deepfake voices is examined in this paper, which also offers a thorough analysis of current approaches, their advantages, and disadvantages. The research presents a novel method for detecting deepfakes in voice recordings that uses signal processing, machine learning, and audio analysis to separate synthetic voices from authentic voices. By achieving superior accuracy in differentiating between real and deepfake voices, and proposed method supplies a strong barrier against the misuse of voice synthesis technology for malicious purposes, also go over the research some of the possible uses for this technology, like voice authentication system security and social media platform content moderation. The paper's insights will support continued efforts to strengthen the authenticity of voice communication in the digital age and reduce the risks associated with deepfake voice synthesis. The Author(s), under exclusive license to Springer Nature Switzerland AG 2024. -
Epilepsy Detection Using Supervised Learning Algorithms
In the current scenario, people are suffering and isolated by themselves by seizure detection and prediction in epilepsy. Also, it is highly essential that it needs to be identified through wearable devices. Researchers discussed this issue and outlined future developments in this field, suggesting that Machine Learning (ML) techniques could radically change how we diagnose and manage patients with epilepsy. However, as data availability has increased, Deep Learning (DL) techniques have become the most cutting-edge approach to adopt and use with wearable devices. On the other hand, large amounts of data are needed to train DL models, making overfitting problematic. DL models are created with open-source toolboxes and Python, allowing researchers to create automated systems and broaden computational accessibility. This work thoroughly overviews deep learning (DL) methods and neuroimaging modalities for automated epileptic seizure identification. It covers several MRI and EEG techniques for epileptic seizure diagnosis and treatment programmes designed to treat these seizures. The study also covers the difficulties in precise detection, the benefits and drawbacks of DL-based strategies, potential DL models and upcoming research in this area. 2024 IEEE. -
Full Reference Image Quality Assessment (FR-IQA) of Pre-processed Structural Magnetic Resonance Images
Deep learning-based Artificial Intelligence algorithms have surpassed human-level performance in many fields including medicine. Specifically in diagnosis using radiology images, deep neural networks empowered AI to excel by educating intricate nonlinear relationships which is a core part of the complicated radiology problems. However, these models require a massive amount of quality data for training. The accuracy of the deep learning model is based on the amount of training data and the quality of the trained data being fed. So, preprocessing the data from different capturing devices is inevitable. This study aimed to highlight some of the image quality metrics that can be used to quantify the efficiency of the chosen preprocessing pipeline. By quantifying the result of each preprocess step, the user can choose an optimal set of preprocesses that can greatly improve the image quality, leading to a high and accurate diagnosis through a deep learning model. Thus, this study detailed how the full reference image quality metrics can be used to validate the performance of sMRI preprocess tasks. 2024 IEEE. -
Durability Studies and Stress Strain Characteristics of hooked end steel fiber reinforced ambient cured geopolymer concrete
For conventional concrete, the use of fibers has proven to improve the strength properties of the material. However, in the case of ambient cured geopolymer concrete, there are limited studies that explore the application of fibers, in particular, the use of hooked end steel fibers. Further, it is important to study the durability properties of geopolymer concrete with fibers, since it will influence the service life of the structures in practice. Therefore, in the present study, fiber-reinforced geopolymer concrete was synthesized using fly ash, GGBS, hooked end steel fibers, and alkaline solution made with Na2SiO3 and NaOH. The percentage of steel fibers varied in the range of 0.5% to 2% with an increment of 0.5% by volume fraction of the binder. The precursor materials were characterized using techniques such as X-ray fluorescence (XRF), X-ray diffraction (XRD), and scanning electron microscope (SEM). Durability studies like water absorption, drying shrinkage, sulphate attack were studied. In addition, the elastic constants were determined through stress strain behaviour of geopolymer concrete in uniaxial compression. The results of the experimental study showed that the addition of hooked end steel fibers influences the strength of geopolymer concrete up to an optimal percentage, which was found to be 1%. Furthermore, in terms of durability properties, the addition of fibers exhibited better results in terms of resistance to water absorption and chemical attack, and this was validated by the microstructural studies, where the specimens with hooked end steel fibers revealed much denser hardened geopolymer matrix when compared to the mixes without fibers. Published under licence by IOP Publishing Ltd. -
English to Hindi Translation System Using Hybrid Techniques
Good communication is critical for overcoming cultural and linguistic divides in today's internationalized society. An essential communication component is the Translation of written materials, primarily academic papers, from one language into another. This abstract focuses on the research involved in translating academic publications from Hindi to English. Translating Hindi academic papers into English is naturally hard due to the significant linguistic and cultural differences between the two languages. The proposed work provided an analytical analysis of various models used in language translation, including the seq-to-seq model, MT5, and LSTM, with the help of BLEU score, Learning rate, and average loss. MT5 model outshines others in terms of an average loss of 4.75; meanwhile, LSTM has an average loss of 5.56, and the seq-to-seq model has an average loss of 6.09, implying weaker Translation. 2024 IEEE. -
Integrated Automated Attendance System with RFID, Wi-Fi, and Visual Recognition Technology for Enhanced Classroom Security and Precise Monitoring
The integrated automated smart attendance system utilizes RFID, Wi-Fi, and visual recognition technologies to elevate classroom security and ensure precise monitoring of attendance records. It consolidates cutting-edge components such as RFID tags, ESP8266 Wi-Fi modules, ESP-32 CAM modules, solenoid locks, servo motors, and PIR sensors to devise a strong remedy. RFID technology enables accurate attendance tracking by assigning tags to students and faculty members. The Wi-Fi and visual recognition components enhance the system's functionalities, facilitating wireless connectivity, instantaneous data transfer, and validation of identities. Solenoid locks and servo motors ensure controlled access, responding to validated attendance records. PIR sensors detect motion, contrasting between genuine presence and proximity. The paper's methodology delineates the necessary hardware and software requirements, procedures for system initialization, testing phases, establishment of server connectivity, implementation of access control mechanisms, and formulation of end-of-session protocols. It highlights the successful integration and validation of hardware components, backend connectivity, identity confirmation, attendance recording, data encryption, and session termination procedures. The research aims to modernize attendance tracking in educational settings, improving efficiency, accuracy, and security while appreciating the need for further adaptation to suit diverse educational environments for broader adoption and sustained advancement. 2024 IEEE. -
Cached-N-Proxy: An Intelligent Proxy Algorithm for Preventing Insider Email Threats to Mail Servers
Insider threats are serious security risks that come from people who work for or are contracted by an organization, such as partners, employees, or contractors. These people use their authorized access to commit hostile acts against the infrastructure, data, or assets of the company. Serious ramifications could result from these dangers, such as financial losses, reputational harm, data breaches, and possible threats to national security. Enterprises must strengthen their defenses with strong intrusion detection and prevention systems because of the growing attack surface for insider threats caused by the increasing adoption of digital technology and remote work habits. Organizations must use a combination of preventive strategies and detection mechanisms, such as privileged access management (PAM), role-based access control, data loss prevention (DLP) techniques, two-factor authentication, and thorough insider threat awareness training, to effectively combat insider threats. 2024 IEEE. -
Predicting Song Popularity Using Data Analysis
In today's music landscape, predicting a song's success is crucial for musicians, record labels, and streaming platforms. This paper introduces a methodology for estimating popularity using Spotify data, termed the 'Proxy Popularity Score.' Three models - Random Forest, LightGBM Regressor, and XGBoost Regressor - are utilized for prediction. Performance metrics including mean absolute error, mean squared error, root mean squared error, and R-squared error are employed to evaluate model accuracy. Correlation values of 99.85%, 99.87%, and 99.84% are achieved for XGBoost, LightGBM, and Random Forest respectively. The study concludes with a ranking of songs based on predicted popularity scores. 2024 IEEE. -
Blockchain-Enabled Smart Contracts in Agriculture: Enhancing Trust and Efficiency
This study explores the important role of blockchain technology in the transformation of agriculture and presents a new way to integrate chatbots and smart contracts to solve the problem of persistence. Leverage the decentralized structure and security of the blockchain to increase traceability, transparency and fairness in agricultural product prices. A user-friendly chatbot built in Python using Tkinter that acts as a bridge between farmers and the Ethereum-based blockchain pricing algorithm. Smart contracts used in Solidity dynamically adjust crop prices based on the weather in real time, making it possible for prices to react and adjust. Simulations and tests in Ganache validate the proposed method, confirming its economic value and effectiveness in many agricultural cultures. This study delves into analytics, including latency and production time, to demonstrate the benefits of the blockchain model in creating transparent, farmer-centric and region-specific crop prices. The importance of this research is to support continuous change in agricultural technology, paving the way for the introduction of appropriate and fair prices. According to the amendment, the integration of advanced machine learning, further integration and collaboration with agricultural stakeholders should be developed in the future. This work sets a good path for agriculture, promoting transparency, fairness and quick access to the best crop prices, thus ensuring security and agricultural technology. 2024 IEEE. -
Deep Insights into 3D Face Reconstruction from Blurred 2D Inputs: A Comprehensive Framework
This framework outlines a multi-stage methodology for 3D face reconstruction driven by advancements in deep learning. The process involves image preprocessing with deblurring techniques and subsequent feature extraction using CNNs alongside traditional methods. Deep learning adapts to diverse image challenges, ensuring accuracy in 3D reconstructions. In medical imaging, the proficiency of 3D CNNs and GANs shines in extracting structures from MRI and CT scans. Post-processing steps encompass mesh smoothing and texture mapping for enhanced visual quality. Evaluation metrics (MAE, RMSE, IoU) guarantee the precision of depth estimations. Applications of deep learning span across CNNs, 3DMM, GANs, and networks for landmark detection and dense correspondence. Challenges include optimizing eye reconstruction, expanding applications, and addressing concerns related to data quality, privacy, and hardware requirements. 2024 IEEE. -
A Feature Selection Study on the Bot-IoT Dataset Using Ensemble Classification Techniques
IoT is an emerging giant in the field of technol- ogy, taking over traditional systems, providing interconnected- ness, convenience, efficiency, and automation, making our lives unimaginably better. However, security for these IoT systems is challenging, especially due to their interconnectedness, making them vulnerable to various cyber threats. The rising tide of IoT botnets, especially, presents a unique challenge. This has urgently increased the need for Intrusion Detection research. Modern Intrusion Detection approaches often employ Machine Learning for effective results. Feature Selection is extremely important while creating Machine Learning Classification models to avoid overfitting and poor performance. This paper focuses on running a Feature Selection study on the Bot-IoT dataset provided by UNSW to increase the accuracy of a ML model. The paper tests 5 types of Feature Selection methods, from Filter- based, Wrapper-based and Embedded methods, combined with two distinct ensemble classifiers: Random Forest + Adaboost and XGBoost. Each combination is tested with the dataset, and the accuracy is compared to find the most effective and versatile feature selection method that can assist both Stacking and Voting- type Ensemble classifiers. The results show that Karl Pearson can provide the best accuracy when applied to both Ensemble Classifiers. 2024 IEEE. -
Detection of DoS Attacks Using Machine Learning Based Intrusion Detection System
Conventional intrusion detection systems are not always sufficient due to the increasing sophistication and frequency of Denial-of-Service (DoS) attacks. This work presents a novel solution to this problem by leveraging machine learning techniques to increase the precision and efficacy of real-time intrusion detection. The system keeps a careful eye on network traffic patterns, looking for any irregularities that would point to a denial-of-service attack. An Intrusion Detection System (IDS) that utilizes machine learning technologies - specifically, neural networks and support vector machines - allows for real-time adaptation to new attack patterns. A combination of rigorous simulations and real-world testing provides empirical support for the IDS's quick detection and mitigation of DoS threats. This initiative makes a major contribution to the development of cybersecurity defenses. 2024 IEEE. -
A Hybrid Approach for Predictive Maintenance Monitoring of Aircraft Engines
The realm of aircraft maintenance involves predictive maintenance, which utilizes historical data and machine parts' performance to anticipate the need for maintenance activities. The primary focus of this paper is to delve into the application of predictive maintenance of aircraft gas turbine engines. Our methodology involves assigning a randomly chosen deterioration value and monitoring the change in flow and efficiency over time. By carefully analyzing these factors, we can deduce whether the engines are at fault and whether their condition will deteriorate further. The ultimate objective is to identify potential engine malfunctions early to prevent future accidents. Recent years have witnessed the emergence of multiple machine learning and deep learning algorithms to predict the Remaining Useful Life (RUL) of engines. The precision and accuracy of these algorithms in assessing the performance of aircraft engines are pretty promising. We have incorporated a hybrid model on various time series cycles to enhance their efficacy further. Employing data collected from 21 sensors, we can predict the remaining useful life of the turbine engines with greater precision and accuracy. 2024 IEEE. -
Delay Minimization Technique to improve the efficiency of Parameter Optimized Hysteretic Current Controlled Parallel Hybrid ETPA in Mobile Communication
This paper proposes a delay minimization technique to improve the efficiency of a parameter-optimized hysteretic current-controlled parallel hybrid envelope tracking power amplifier (etpa). In a hysteretic current-controlled hybrid topology, a linear amplifier operates parallel with a hysteretic current-controlled switching converter. Block level simulation of etpa is performed using the simulink tool. The traditional parameter optimization technique is first implemented, and its limitation is analysed. The proposed delay minimization technique helps to overcome the limitation of the traditional approach and has been proven to be valid for any input frequency. The proposed technique offers an efficiency improvement of 14.9% compared to the traditional technique for an input frequency of 20mhz and provides an average efficiency improvement of 6.26% for an input frequency range of 2mhz to 60mhz. 2024 IEEE. -
Analysis of an Existing Method for Detecting Adversarial Attacks on Deep Neural Networks
Analyzes the existing method of detecting adversarial attacks on deep neural networks, proposed by researchers from Carnegie Mellon University and the Korean Institute of Advanced Technologies (KAIST) Ko, G. and Lim, G in 2021. Examines adversarial attacks, as well as the history of research on the topic. The paper considers the concepts of interpreted and not interpreted neural networks and features of methods of protection of the types of neural networks considered. The method for protecting against adversarial attacks is also considered to be applicable to both types of neural networks. An example of an attack simulation is given, which makes it possible to identify a sign showing that an attack has been committed. The Author(s), under exclusive license to Springer Nature Switzerland AG 2024. -
Exploring the Influence of Ethnicity and Environmental Values on Eco-Entrepreneurship: A Structural Equation Modeling Approach
In today's world, sustainability is of immense importance due to population growth, pollution and resource depletion. Consequently, there is an urgent need to devise future-oriented strategies for sustaining life on Earth. The rise of green business and the Sustainable Development Goals (SDGs) reflect society's growing awareness and commitment to environmentally friendly living. Our research examines the link between eco-entrepreneurship and the SDGs among young adults who are the next generation of entrepreneurs. We aim to understand how these individuals plan to incorporate the SDGs into their future business. Conducted primarily through surveys of 17- to 26-year-olds, our research uses the Statistical Equation Model (SEM) to analyze the relationship between eco-entrepreneurship, the SDGs and today's youth. In addition, we examine how current educational practices influence young adults' attitudes toward sustainability. By delving into these aspects, our paper seeks to improve the understanding of how young adults, our future leaders, perceive and pursue green business and sustainable development goals, ultimately determining the importance of these concepts for our future. 2024 IEEE. -
Food Recommendation System using Custom NER and Sentimental Analysis
In today's fast-paced lifestyle, the need for efficient and personalized solutions is paramount, especially in the category of dining experiences. This research responds to this demand by proposing a better food recommendation system for Zomato reviews. It targets the audience who are not aware of the best cuisines and search for user reviews online. Utilizing custom Named Entity Recognition (NER) and sentiment analysis, the system seeks to understand and cater to individual food preferences extracted from user Reviews. Specifically, improving the analysis by extracting reviews for ten restaurants in the city of Kolkata. By providing a specific solution to address the current research gap in the area of restaurants recommendation systems, the system recommends top choices for neighboring restaurants and best food based on the sentimental analysis of the chosen menu items. 2024 IEEE. -
Plant Disease Detection and Classification using Emperor Penguin Optimizer (EPO) based Region Convolutional Neural Network (RCNN)
Agriculture stands as India's most crucial industry, despite grappling with a 35% annual loss in crop yield attributed to plant diseases. Traditionally, the detection of plant diseases has been a laborious process, hampered by insufficient laboratory infrastructure and expert knowledge. Plant disease detection methods that are automated provide a useful way to expedite the labor-intensive process of keeping an eye on large-scale agricultural fields and recognizing disease symptoms as soon as they appear on plant leaves. Current developments in deep learning (DL) and computer vision have highlighted the benefits of creating autonomous models for plant disease identification based on visible symptoms on leaves. In this study, we propose a novel method for detecting and classifying plant diseases by combining the Emperor Penguin Optimizer (EPO) with a Region Convolutional Neural Network (RCNN). The suggested methodology uses EPO to improve the discriminative power of features extracted from plant pictures, allowing for a more robust and accurate classification procedure. The Classification Region Convolutional Neural Network (RCNN) is used to leverage spatial correlations within the image, allowing for exact disease region localization. The goal of this integration is to increase the overall efficiency and dependability of plant disease detection systems. The investigations made use of the well-known PlantVillage dataset, which comprises 54,305 data of different plant disease types in 38 categories. Furthermore, an analysis was carried out in comparison with similar advanced investigations. According to the experiment results, RCNN-EPO outperformed in terms of classification accuracy, achieving 94.552%. 2024 IEEE. -
EmploChain: A Blueprint for Blockchain-Driven Transformation in Employee Life Cycle Management
Integrating blockchain technology into human resource management presents both transformative opportunities and implementation challenges that need to be addressed. This paper proposes a blockchain-based EmploChain Framework, a decentralized ledger approach specifically designed to enable Employee Life Cycle Management by harnessing the potential of blockchain technology. The study looks at the potential benefits of the proposed framework, including increased security, transparency, and automation. The paper also looks at potential limitations like scalability concerns and implementation costs and explores the possible solutions to overcome them. The aim of this research is to provide a thorough understanding of the framework's implications, thereby facilitating informed decisions to implement EmploChain Framework for managing the Employee Life Cycle of an organization.. 2024 IEEE. -
Predicting Coal Prices: A Machine Learning Approach for Informed Decision-Making
This research addresses the critical need for accurate coal price prediction in the dynamic global market, crucial for informing strategic decisions and investment choices. With coal playing a vital role in the world energy mix, its price fluctuations impact industries and economies worldwide. The study employs advanced machine learning models, including Linear Regression, Random Forest, SVM, Adaboost, and ARIMA, to enhance prediction precision. Key features such as S&P 500, Crude Oil Price, CPI, Exchange Rates, and Total Electricity Consumption are identified through feature importance analysis. The Random Forest model emerges as the most effective, emphasizing the significance of key variables. Leveraging explainable AI techniques, the study provides transparent insights into model decision-making, offering valuable information for risk management and strategic decision-making in the volatile coal market 2024 IEEE.